Study On Key Technology For Encryption And Security System In Wireless Communication Network Hsien-Wei Tseng 1 Rong-Hou Wu 2 Chih-Yuan Lo 3 Yang-Han Lee 3 Liang-Yu Yen 3 1 Dept. of Computer & Communication, Engineering DE LIN Institute of Technology Tucheng,Taipei County, Taiwan 251, R.O.C hsienwei.tseng@gmail.com 2 Dept. of Computer & Communication, Engineering St. John's University Tamsui,Taipei County, Taiwan 251, R.O.C rhwu@mail.sju.edu.tw 3 Dept. of Electrical Engineering, Tamkang University Tamsui,Taipei County, Taiwan 251, R.O.C. grimmg@ee.tku.edu.tw yhlee@ee.tku.edu.tw skyslj@hotmail.com AbstractA novel secure encryption using the recieved signal strength indicator (RSSI) has been proposed in this paper. RSSI signals are time variant and irregular, especially in more complicated environment. Changes of RSSI can generate a nonperiodical random number, and an attacker will hardly predict this number. Furthermore, we use this option, open cryptography algorithm, and rapid stream ciphers to construct an efficient encryption system for wireless communication network. Keywords-Encryption, Security system, I. INTRODUCTION Due to diversity transmission services, the new age communication system is facing more security issues than previous years [1-6]. The operation capability of computing equipement at the client end will for sure be much stronger in the next generation. Digital signature or Non-repudiation of information is the premise of commercial trade on the network; therefore, the demand for security system becomes more and more important. This is not what tradition Secret-key Cryptosystem can do. Presently, ITU-R (International Telecommunications Union – Radio communications Sector) is planning a security serverses which at least includes Authentication, Privacy and Anonymity, Confidentiality, Integrity, Authorization and Access Control, Event Limitation, and Event Reporting. A study of Security Mechanisms, ITU-R also presents three possible types: Secret Key Check Functionfor bi-direction I.D. authentication module, Digital Signature single direction I.D. authentication module, and Public-key Cryptosystem single direction I.D. authentication module. In accordance with high-speed wireless LAN IEEE 802.11 standard formulates the Wired Equivalent Privacy Algorithm (WEP), which has a equal function of data privacy algorithm as wire network. Stream Cipher technique [7-8] is the simplest and the fastest enciphering/deciphering method. Because of its limitation by hardware, it has a fixed period length, so it needs 2L output serier for feedback equations, where L is linear complicity. To overcome this imperfection, we fetch RSSI signals from IF (intermediate frequency) circuit of wireless communication, for generate random number. RSSI signals exchanged by environment are irregular, non-periodical, and have time variant. Therefore it is very suitable to use on password systems. The proposed encryption system in this paper uses the complicated environment RSSI characteristics, its unpredictable number, and the fact that wireless LAN’s application is always in complicated indoors transmission environment. So this encryption system is very suitable for wireless communication network. II. GENERATION OF ENVIRONMENT RANDOM NUMBER The multi-path effect and environment variable are the factors that change RSSI signals. A random number generate from this RSSI is called environment random number (ERN) in this paper. The flow chart of generating ERM is shown in Fig.1 and is described in details below. RSSI signal, which is fetched from IF circuit of wireless communication, is sampled and quantized after passing through a linear amplifier R(nT) = R(t)|t=nT , 0 n Where R(t) is RSSI signals, T is sample period, and R(nT) is discrete RSSI signal. Annual International Conference on Infocomm Technologies in Competitive Strategies (ICT 2010). Copyright © GSTF 2010. ISBN: 978-981-08-7240-3. doi:10.5176/978-981-08-7240-3 I-27 60